CVE-2024-23805: CWE-131 Incorrect Calculation of Buffer Size in F5 BIG-IP
Undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. For the Application Visibility and Reporting module, this may occur when the HTTP Analytics profile with URLs enabled under Collected Entities is configured on a virtual server and the DB variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. For BIG-IP Advanced WAF and ASM, this may occur when either a DoS or Bot Defense profile is configured on a virtual server and the DB variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. Note: The DB variables avr.IncludeServerInURI and avr.CollectOnlyHostnameFromURI are not enabled by default. For more information about the HTTP Analytics profile and the Collect URLs setting, refer to K30875743: Create a new Analytics profile and attach it to your virtual servers https://my.f5.com/manage/s/article/K30875743 . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
AI Analysis
Technical Summary
CVE-2024-23805 is a high-severity vulnerability affecting F5 BIG-IP devices, specifically versions 15.1.0, 16.1.0, and 17.1.0. The vulnerability is classified under CWE-131, which relates to incorrect calculation of buffer size. This flaw arises within the Traffic Management Microkernel (TMM) component of BIG-IP when certain configurations are enabled. Specifically, the issue manifests when the HTTP Analytics profile with URLs enabled under Collected Entities is applied to a virtual server, and either of the database variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. Similarly, for BIG-IP Advanced WAF and ASM modules, the vulnerability can be triggered when a DoS or Bot Defense profile is configured on a virtual server with these same DB variables enabled. These variables are not enabled by default, which somewhat limits exposure. Exploitation of this vulnerability causes the TMM process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but severely affects availability. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and an impact limited to availability. No known exploits are currently reported in the wild, and the vulnerability affects supported versions only, excluding those that have reached End of Technical Support. The root cause is an incorrect buffer size calculation leading to a crash when processing specific undisclosed requests under the described configuration settings. This vulnerability underscores the importance of careful configuration management and patching in critical network infrastructure devices such as F5 BIG-IP, which are widely used for load balancing, application delivery, and security enforcement.
Potential Impact
For European organizations, the impact of CVE-2024-23805 can be significant due to the widespread deployment of F5 BIG-IP devices in enterprise and service provider networks. The vulnerability leads to denial of service by crashing the TMM process, which handles traffic management and security functions. This can cause service outages, degraded application availability, and potential disruption of critical business operations, especially for organizations relying on BIG-IP for load balancing, web application firewall (WAF), and bot defense. Industries such as finance, telecommunications, healthcare, and government agencies in Europe that depend on high availability and secure application delivery are particularly at risk. The fact that exploitation requires no authentication or user interaction increases the threat level, as attackers can remotely trigger the crash by sending crafted requests to vulnerable virtual servers with the specified configurations. Although the vulnerability does not allow data theft or modification, the resulting downtime can lead to financial losses, reputational damage, and regulatory compliance issues under GDPR and other European data protection laws if services are disrupted. Additionally, the complexity of the configuration settings involved means some organizations may unknowingly enable the vulnerable options, increasing exposure. The absence of known exploits in the wild provides a window for proactive mitigation but also means organizations should act swiftly to audit configurations and apply patches once available.
Mitigation Recommendations
1. Immediate configuration audit: European organizations should review their F5 BIG-IP configurations to identify any virtual servers using the HTTP Analytics profile with URLs enabled and check if the DB variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. Since these variables are not enabled by default, disabling them if not strictly necessary can mitigate exposure. 2. Patch management: Monitor F5’s official advisories and apply vendor-provided patches or hotfixes as soon as they become available for the affected BIG-IP versions (15.1.0, 16.1.0, 17.1.0). 3. Network segmentation and filtering: Restrict access to management and virtual server interfaces to trusted networks and IP addresses to reduce the attack surface. 4. Deploy redundancy and failover: Ensure high availability configurations are in place so that if one BIG-IP device experiences a crash, traffic can be rerouted to backup devices minimizing downtime. 5. Monitoring and alerting: Implement enhanced logging and monitoring for TMM process crashes or unusual traffic patterns that could indicate exploitation attempts. 6. Disable unnecessary profiles: If DoS, Bot Defense, or HTTP Analytics profiles are not required, consider disabling them to reduce the attack surface. 7. Incident response readiness: Prepare playbooks for rapid response to potential denial of service incidents caused by this vulnerability. These steps go beyond generic advice by focusing on specific configuration variables and profiles implicated in the vulnerability and emphasizing proactive configuration management alongside patching.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2024-23805: CWE-131 Incorrect Calculation of Buffer Size in F5 BIG-IP
Description
Undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. For the Application Visibility and Reporting module, this may occur when the HTTP Analytics profile with URLs enabled under Collected Entities is configured on a virtual server and the DB variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. For BIG-IP Advanced WAF and ASM, this may occur when either a DoS or Bot Defense profile is configured on a virtual server and the DB variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. Note: The DB variables avr.IncludeServerInURI and avr.CollectOnlyHostnameFromURI are not enabled by default. For more information about the HTTP Analytics profile and the Collect URLs setting, refer to K30875743: Create a new Analytics profile and attach it to your virtual servers https://my.f5.com/manage/s/article/K30875743 . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
AI-Powered Analysis
Technical Analysis
CVE-2024-23805 is a high-severity vulnerability affecting F5 BIG-IP devices, specifically versions 15.1.0, 16.1.0, and 17.1.0. The vulnerability is classified under CWE-131, which relates to incorrect calculation of buffer size. This flaw arises within the Traffic Management Microkernel (TMM) component of BIG-IP when certain configurations are enabled. Specifically, the issue manifests when the HTTP Analytics profile with URLs enabled under Collected Entities is applied to a virtual server, and either of the database variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. Similarly, for BIG-IP Advanced WAF and ASM modules, the vulnerability can be triggered when a DoS or Bot Defense profile is configured on a virtual server with these same DB variables enabled. These variables are not enabled by default, which somewhat limits exposure. Exploitation of this vulnerability causes the TMM process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but severely affects availability. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and an impact limited to availability. No known exploits are currently reported in the wild, and the vulnerability affects supported versions only, excluding those that have reached End of Technical Support. The root cause is an incorrect buffer size calculation leading to a crash when processing specific undisclosed requests under the described configuration settings. This vulnerability underscores the importance of careful configuration management and patching in critical network infrastructure devices such as F5 BIG-IP, which are widely used for load balancing, application delivery, and security enforcement.
Potential Impact
For European organizations, the impact of CVE-2024-23805 can be significant due to the widespread deployment of F5 BIG-IP devices in enterprise and service provider networks. The vulnerability leads to denial of service by crashing the TMM process, which handles traffic management and security functions. This can cause service outages, degraded application availability, and potential disruption of critical business operations, especially for organizations relying on BIG-IP for load balancing, web application firewall (WAF), and bot defense. Industries such as finance, telecommunications, healthcare, and government agencies in Europe that depend on high availability and secure application delivery are particularly at risk. The fact that exploitation requires no authentication or user interaction increases the threat level, as attackers can remotely trigger the crash by sending crafted requests to vulnerable virtual servers with the specified configurations. Although the vulnerability does not allow data theft or modification, the resulting downtime can lead to financial losses, reputational damage, and regulatory compliance issues under GDPR and other European data protection laws if services are disrupted. Additionally, the complexity of the configuration settings involved means some organizations may unknowingly enable the vulnerable options, increasing exposure. The absence of known exploits in the wild provides a window for proactive mitigation but also means organizations should act swiftly to audit configurations and apply patches once available.
Mitigation Recommendations
1. Immediate configuration audit: European organizations should review their F5 BIG-IP configurations to identify any virtual servers using the HTTP Analytics profile with URLs enabled and check if the DB variables avr.IncludeServerInURI or avr.CollectOnlyHostnameFromURI are enabled. Since these variables are not enabled by default, disabling them if not strictly necessary can mitigate exposure. 2. Patch management: Monitor F5’s official advisories and apply vendor-provided patches or hotfixes as soon as they become available for the affected BIG-IP versions (15.1.0, 16.1.0, 17.1.0). 3. Network segmentation and filtering: Restrict access to management and virtual server interfaces to trusted networks and IP addresses to reduce the attack surface. 4. Deploy redundancy and failover: Ensure high availability configurations are in place so that if one BIG-IP device experiences a crash, traffic can be rerouted to backup devices minimizing downtime. 5. Monitoring and alerting: Implement enhanced logging and monitoring for TMM process crashes or unusual traffic patterns that could indicate exploitation attempts. 6. Disable unnecessary profiles: If DoS, Bot Defense, or HTTP Analytics profiles are not required, consider disabling them to reduce the attack surface. 7. Incident response readiness: Prepare playbooks for rapid response to potential denial of service incidents caused by this vulnerability. These steps go beyond generic advice by focusing on specific configuration variables and profiles implicated in the vulnerability and emphasizing proactive configuration management alongside patching.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2024-02-01T22:13:58.511Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6dcf
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/4/2025, 9:58:27 PM
Last updated: 8/11/2025, 5:37:31 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.